Why would a network administrator configure port security on a switch?
Why would a network administrator configure port security on a switch?A . to prevent unauthorized Telnet access to a switch portB . to prevent unauthorized hosts from accessing the LANC . to limit the number of Layer 2 broadcasts on a particular switch portD . block unauthorized access to the...
What does the customer pay foe In a subscription-based pricing model?
What does the customer pay foe In a subscription-based pricing model?A . The market price for the service, which varies over time based on supply and demand.B . They pay the same amount regardless of the resources they used.C . The usage that is correlated back to cloud consumers.D ....
Which of the below are viable mitigation techniques?
You are designing a social media site and are considering how to mitigate distributed denial-of service (DDoS) attacks. Which of the below are viable mitigation techniques? (Choose 3 answers)A . Add multiple elastic network interfaces (ENis) to each EC2 instance to increase the network bandwidth.B . Use dedicated instances to ensure that each instance...
What is causing this discrepancy?
You are the system administrator at Contoso, Inc. You have imported 3 GB of data into an instance, but the storage utilization for your subscription does not reflect the used storage space. What is causing this discrepancy?A . You imported the data into a sandbox instance.B . Custom indexing is...
What is the minimum number of SQL Server servers that you should add?
Topic 6, Mix Questions You have a Skype for Business Server 2015 infrastructure that contains an Enterprise Edition front end pool. You plan to add the following servers and roles to the existing infrastructure: - Edge Server - Archiving role - Monitoring role - Persistent Chat Server You need to...
Which process sorts traffic and can expedite or drop traffic according to a defined policy?
Which process sorts traffic and can expedite or drop traffic according to a defined policy?A . behavioral modelingB . provisioning, monitoring, and managementC . queuing and WREDD . NBARView AnswerAnswer: B
Employees upgraded company issued OS devices. Which are configured to authenticate to the network using WPA2-Eniefpnse 802 lx with LEAP As a result, the devices are no longer able to authenticate Which action must the engineer do 10 resolve the issue?
Employees upgraded company issued OS devices. Which are configured to authenticate to the network using WPA2-Eniefpnse 802 lx with LEAP As a result, the devices are no longer able to authenticate Which action must the engineer do 10 resolve the issue? Refer to the exhibit. A . Redeploy the existing...
What is the default operating mode you are initially logging into a router?
What is the default operating mode you are initially logging into a router?A . global configurationB . privileged EXECC . ROM monitorD . user EXECView AnswerAnswer: D
In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon?
In which type of attack does an attacker send email messages that ask the recipient to click a link such as https://www.cisco.net.cc/securelogon?A . phishingB . pharmingC . solicitationD . secure transactionView AnswerAnswer: A
Which two possible commands can you use to achieve the goal?
Your network contains an Active Directory forest. The forest contains a single domain. The forest has five Active Directory sites. Each site is associated to two subnets. You add a site named Site6 that contains two domain controllers. Site6 is associated to one subnet. You need to verify whether replication...